A Case Study of RFID-Enabled Payment Device

Article Preview

Abstract:

Payment cards supporting contactless transactions are becoming increasingly popular in recent years. While enjoying the benefits in terms of speed and convenience provided by the new feature, considerable concerns over security and privacy of RFID technology used for contactless payment have been raised for some time. Actually, diverse attacks against fielded systems have already been found and demonstrated. Among the various existing countermeasures, cryptographic solutions are more commonly used as a mechanism for providing security and privacy protections. The goal of this paper is to take a deep insight into one of the RFID-enabled payment devices, known as Digital Signature Transponder (DST). Especially, the explanation of its cryptographic design is presented in detail.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 588-589)

Pages:

2021-2025

Citation:

Online since:

November 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device,. In P. McDaniel, editor, 14th USENIX Security Symposium, pages 1–15. USENIX, (2005).

Google Scholar

[2] Information on http: /en. wikipedia. org/wiki/Digital_signature_transponder.

Google Scholar

[3] Z. Liu, and D. Peng: A Secure RFID Identity Reporting Protocol for Physical Attack Resistance, Journal of Communications (JCM), ISSN : 1796-2021, Volume 1, Issue 4 (2006).

DOI: 10.4304/jcm.1.4.31-40

Google Scholar

[4] S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo: Security analysis of a cryptographically-enabled RFID device, In P. McDaniel, editor, 14th USENIX Security Symposium, p.1–15 (2005).

Google Scholar

[5] A. Juels: RFID Security and Privacy: A Research Survey, Condensed version to appear in 2006 in the IEEE Journal on Selected Areas in Communication (2006).

Google Scholar